Articles about Q&A

Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]

home working

There was already a shortage of cyber skills before the COVID-19 pandemic hit, and since then we've had a perfect storm of home working and the Great Resignation to make things worse still.

But is there an unexploited resource out there that could help fill the skills gap? Sonny Sandelius, assistant director of workforce programs at cyber security training skills company SANS believes there could be in the form of an army of the hobbyists and DIYers.

Continue reading

Ensuring compliance in the modern enterprise [Q&A]

Compliance gauge

An increasing volume of regulations surrounding the security and privacy of data have been implemented in recent years. This represents a challenge for businesses that need to ensure they remain compliant.

The challenge has become even greater due to the pandemic and the consequent shift in working patterns. So how can enterprises ensure that they remain compliant and don't fall foul of the rules?

Continue reading

The challenge of guarding against supply chain attacks [Q&A]

Broken chain

In recent years we've seen a trend towards attacks targeting the software supply chain rather than being directly against businesses.

Attacks can include poisoning the software components, stealing secrets to compromise an account, or modifying code repositories to allow for exploits.

Continue reading

Why the time is right for enterprises to consider edge computing [Q&A]

The technology world never stands still for very long and keeping in touch with trends is important if you're not to be left behind.

In recent years we've seen moves to the cloud and to DevOps, trends which show no signs of slowing down. But there's now a trend towards putting computing power at the edge, closer to the users.

Continue reading

The CSO's new seat at the executive table and how to use it [Q&A]

Boardroom

With the changes to working patterns brought about by the pandemic and increasing levels of cyberattacks, the role of the Chief Security Officer (CSO) in businesses has become more challenging.

These things have also led to a boost in the status of CSOs within their organizations. We spoke to Chaim Mazal, CISO and SVP of engineering for Apple device management platform Kandji to find out more about how things have changed and how CSOs can make the most of their new influence to drive security strategy.

Continue reading

How you can take back control of your online data [Q&A]

Wiping data

If you use the internet then it's certain that some organization somewhere is storing data about you. Indeed research shows that people are happy to share information in exchange for a better consumer experience.

However, that data is still yours, so how can you understand what information you're giving away and how can you take better control?

Continue reading

Developing smart tools for Windows -- the man behind CCleaner and Tweakeze [Q&A]

code

Heitor Tome is the man behind a new tool called Tweakeze which is designed to prevent unwanted changes to your computer.

But he also has a long history as the chief architect and software engineer behind popular cleanup program CCleaner -- indeed for several years he was its sole developer.

Continue reading

Why networking technologies remain at the heart of online security [Q&A]

Networked computers

Networks and the internet are reliant on domain name servers, dynamic host control protocol, and IP address management. These three technologies -- grouped together as DDI (DNS, DHCP, IPAM) -- are central to the way things work but that also makes them a tempting target.

We spoke to Ronan David, chief of strategy at EfficientIP to find out why DDI is so vital to online security and how automation can help with defense.

Continue reading

The changing role of the CISO [Q&A]

CISO

Digital transformation, a shift to hybrid and remote working, and increasing regulatory pressure have seen major changes to the enterprise IT landscape in recent years.

CISOs have been at the heart of this, facing new challenges and taking on additional responsibilities. We spoke to Ben Smith, field CTO of NetWitness, to discuss these changes and find out what makes a good, or bad, CISO.

Continue reading

SaaS and what it can teach us about human behavior [Q&A]

SaaS

Software-as-a-service has become increasingly popular and the market for it is still growing -- expected to reach $264 billion (£207 billion) by 2026.

SaaS sales are being driven by more companies continuing to digitize their operations in a post-COVID-19 world. We spoke to Paul Quigley, CEO and co-founder of predictive, real-time media monitoring platform NewsWhip, to discover how using SaaS can improve operations for a company, help grow the business, and even offer insights into human behavior.

Continue reading

How IT can fix the employee experience [Q&A]

home working

The world of work has changed quite considerably over the past few years, driven by a number of factors, not least the pandemic.

Many of these changes have been positive, but some, in particular the shift to hybrid working, have brought challenges too. Some tasks are simply more difficult to do remotely.

Continue reading

Good backups are critical to recovering from ransomware

Backup key

A new report from Enterprise Strategy Group (ESG), sponsored by Keepit, shows that granular and air-gapped backup are critical to data recovery when businesses are hit by ransomware.

Of more than 600 respondents to the survey, 79 percent have experienced a ransomware attack within the last year, with 17 percent experiencing attacks weekly and 13 percent daily.

Continue reading

Outsmarting the new generation of online fraudsters [Q&A]

Fraud

Millions of dollars are lost to online scams each year and the fraudsters are getting ever more sophisticated in the targeting of their attacks.

Much of today's fraud is executed using information about the consumer's habits and personal details, usually captured in phishing attacks or data breaches. The fact that we’re conducting more of our transactions online as a result of the pandemic has created even more opportunity for fraudsters.

Continue reading

Behavioral analytics and why it's important to threat detection and response [Q&A]

AI security

Traditional rule-based security techniques centered on malware signatures and perimeter protection are increasingly unable to cope with the latest, more sophisticated threats.

Taking a more behavior-based approach to spotting unusual or risky activity offers a solution, but what is required to make it work? We spoke to Sanjay Raja, VP of product marketing and solutions at cybersecurity specialist Gurucul, to find out.

Continue reading

What Log4Shell still means for the enterprise [Q&A]

Laptop security

When the Log4Shell vulnerability first appeared at the end of last year it sent a shockwave through the cybersecurity community.

But just because it's no longer in the headlines doesn't mean it's gone away. There's still a lot that enterprises can learn from the vulnerability and the response to it. We spoke to Maninder Singh, corporate vice president and global head of cybersecurity and GRC services at HCL Technologies, to find out more.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.